Authorized Agent

Created on5/18/2015 12:08:00 PM

/ Training Guide
Authorized Agent

Table of Contents

Authorized Agent

User ID and Role Requests

Request Revisions to Existing User ID - Role Assignments

Request Revisions to Existing User ID - Role Assignments Overview

Request Revisions to Existing User ID - Role Assignments Lesson

Page 1
/ Training Guide
Authorized Agent

Authorized Agent

User ID and Role Requests

Request Revisions to Existing User ID - Role Assignments

Request Revisions to Existing User ID - Role Assignments Overview

Authorized Agents (AA20) manage requestsfor revisions to User IDs and their roles through this application. Revision requests include: additions, revisions, and removal of roles for existing User IDs.

Authorized Agents ONLY have access to User IDs in Agencies for which they are assigned as Authorized Agents. This access is driven by the Address Book Number of the User and the Agency with which the Address Book Number and Security Business Unit are associated.

Business Process Owners will review role assignment requests as appropriate.

Authorized Agents will receive e-mail notification when requests are completed and should use the Security Request Inquiry application to check that their employees’ User IDs have the correct functional roles assigned.

Request Revisions to Existing User ID - Role Assignments Lesson

Procedure

Step / Action
Click the Navigator menu.

Click theState of Nebraskalink.

Click the Authorized Agents link.

Click the Authorized Agent Request link.

Step / Action
Use the Query by Example (QBE) line to narrow search for an existing User ID.
To populate grid, click theFindbutton.
Authorized Agent will only be able to view User IDs associated with Employees in their Agency of responsibility.

Step / Action
Indicate the User ID to revise by Clicking the radio button in one of the rows containing the User ID.

Click the Select button.

Step / Action
User ID and Address Number populate with User information. Grid populates with ALL roles associated with the User ID.
Authorized Agent can request the following revisions from this screen:
o Change an existing Security Role for a Security Type to a different Role; e.g. change an PT20 to a PT30
o Remove an existing Security Role for a Security Type
o Request a new Security Role for which an end user does not currently have the Security Type
Note: A User ID can only be assigned one Role within a Security Type. For example, a User ID cannot have both a PT10 role and a PT30 role assigned.
Decision:Revise Roles assigned to a User ID - Change Existing Role, Remove Existing Role, Add a new Role to a User ID
  • Change Existing Role
    Go to step 12
  • Remove Existing Role
    Go to step 25
  • Add new Role/Security Type
    Go to step 34

Step / Action
Request to Change an existing Security Role for a Security Type to a Different Role

Step / Action
Click the radio button of the role to change.

REQUESTED ROLE
o Enter requested changes to the User ID; System allows only one Role per Security Type (SEC TY)
o All roles are prefaced with “N000.”
o Changes to levels within a Security Type must be initiated within the ROW currently assigned to the Security Type
Enter the desired information into theREQUESTED ROLEField.
Press[Tab].
STATUS CODE
Automatically populates based on transaction:
o A = Approved – if there is no requirement for approval by a Business Process Owner, then this request will automatically advance to an Approved Status; sends e-mail to NIS Security for NIS Security Change
o P = Pending – A BPO must review the request and take action regarding the request (Approve, Deny); sends e-mail to Business Process Owner(s) for review & action
REQUEST ORIGIN
o Automatically populates with A = Authorized Agent Requested
COMMENTS
o Free text for sharing information throughout the Authorized Agent/BPO process
Note: Take advantage of the Comments section. This information will be available through an Audit Table.
Submit requested revisions to User ID and User Roles, click theOKbutton.

Decision:Select the appropriate option:
  • Revisions Complete
    Go to step 21
  • Continue with Revisions
    Go to step 11

Step / Action
To review requested changes for specific User IDs, search the Work with Role Request grid by using the QBE.

Click the Find button.

Click the Close button.

End of Procedure. Remaining steps apply to other paths.
Step / Action
Request to Remove an Existing Security Role for a Security Type
Click the radio button on the Grid Row containing the Security Role to be removed from the User ID.
Click the option.

Click the Row button.

Click the Remove Accessmenu.

Step / Action
Authorized Agent Request - Remove window appears.
Click the OK button.

Step / Action
REQUESTED ROLE Field on the Grid Row populates with the word "REMOVE".
If the request to remove a specified Security Role is incorrect, delete the word "REMOVE" from the populated Field.
STATUS CODE
o Automatically populates: as A = Approved
o There is no requirement for approval by a Business Process Owner
o Sends e-mail to NIS Security for NIS Security Change
REQUEST ORIGIN
o Automatically populates with A = Authorized Agent Requested
COMMENTS
Free text for sharing information throughout the Authorized Agent/BPO process
Go to step 19
Step / Action
Request a New Security Role/Security Type
As end user responsibilities change, they may require additional Security Types. If the end user does not already have a Security Role for a Specific Security Type, add a Requested Role to the grid.
New requests are added to the first available blank Row in the grid.
REQUESTED ROLE
Enter requested roles; all roles are prefaced with “N000.” You may use the lookup button if you need to find a role or you would prefer to auto populate the Requested Role Field instead of entering the role manually.
Click the REQUESTED ROLE object.

Enter the desired information into theREQUESTED ROLEField.
Press [Tab].
SEC TY – Security Type
Defaults to the Alpha Digits based on the REQUESTED ROLE
STATUS CODE
Automatically populates based on transaction:
o A = Approved – if there is no requirement for approval by a Business Process Owner, then this request will automatically advance to an Approved Status; sends e-mail to NIS Security for NIS Security Change
o P = Pending – A BPO must review the request and take action regarding the request (Approve, Deny); sends e-mail to Business Process Owner(s) for review & action
REQUEST ORIGIN
o Automatically populates with A = Authorized Agent Requested
COMMENTS
o Free text for sharing information throughout the Authorized Agent/BPO process
Note: Take advantage of the Comments section. This information will be available through an Audit Table.
Go to step 19
Page 1